Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
95ba552080033c4c4f8ee4ec1a216a60.vbs
Resource
win7-20231215-en
General
-
Target
95ba552080033c4c4f8ee4ec1a216a60.vbs
-
Size
674KB
-
MD5
95ba552080033c4c4f8ee4ec1a216a60
-
SHA1
ae3fcbf804bdeff2d2121925468ea9c7f4e5d986
-
SHA256
00eca3e9f1585ace0fc6923faad233b9b01b3f8da66cc59abbcc8fad4d3f35ad
-
SHA512
1ff6e6a47888ab51c4903c977d4567f6f1cdf41e04f129013dda4cefca4a85e3ed949b8ac377b4e613e8afad7d2bda6558660cb2eda4854dfbbc0ee926f2ce8f
-
SSDEEP
384:obfnd8WP6VRB3u6RfXjM62GWT9CcjHjUJwv+6uhH/4be3EMuQVgo7ZxoP2Q9zZE/:obO
Malware Config
Extracted
asyncrat
0.5.7B
Default
frankent2021.ddns.net:2455
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Startup.vbs MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 720 set thread context of 2400 720 MSBuild.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2936 wrote to memory of 720 2936 WScript.exe 87 PID 2936 wrote to memory of 720 2936 WScript.exe 87 PID 2936 wrote to memory of 720 2936 WScript.exe 87 PID 720 wrote to memory of 4476 720 MSBuild.exe 89 PID 720 wrote to memory of 4476 720 MSBuild.exe 89 PID 720 wrote to memory of 4476 720 MSBuild.exe 89 PID 4476 wrote to memory of 3800 4476 csc.exe 90 PID 4476 wrote to memory of 3800 4476 csc.exe 90 PID 4476 wrote to memory of 3800 4476 csc.exe 90 PID 720 wrote to memory of 2400 720 MSBuild.exe 91 PID 720 wrote to memory of 2400 720 MSBuild.exe 91 PID 720 wrote to memory of 2400 720 MSBuild.exe 91 PID 720 wrote to memory of 2400 720 MSBuild.exe 91 PID 720 wrote to memory of 2400 720 MSBuild.exe 91 PID 720 wrote to memory of 2400 720 MSBuild.exe 91 PID 720 wrote to memory of 2400 720 MSBuild.exe 91 PID 720 wrote to memory of 2400 720 MSBuild.exe 91
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\95ba552080033c4c4f8ee4ec1a216a60.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" C:\Users\Public\Avast.xml2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\b12tuxdw\b12tuxdw.cmdline"3⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES57C5.tmp" "c:\Users\Admin\AppData\Local\Temp\b12tuxdw\CSCB234FC0B21354F5599592AD5ED25F74B.TMP"4⤵PID:3800
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:2400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD546333c16228fa059e91c7db8489ee306
SHA19407246af17e98118e09c67cf34eba088b4fa603
SHA2565d9a453f792895ce9b584de12d78df4cef6ea267ba23754920b7b6186799f13f
SHA512e0e4a5d4eb3be7cc93b4059e1c59d82b776bfa08582eaf12e1f5849549bd20ec18a3b5c35e1e855b8bd294fdb36949f3224bc86ce07a8cf6f0257b6b4714ff50
-
Filesize
35KB
MD5dd1df5f24ab76d6921c48eb15f702d4a
SHA12fe56307b1c3b8e705eff4753d44ddf947fce692
SHA25601a3f51ac861b6c7f084277d22f2d43601eca3bfa15799b49cbb9069af573e50
SHA512f86ab103988895964f70b99d8c88d4dfa7ef635760814faf685e4512a5170c43204348f09496c41e7e606cf650f781f0eaf743f9a52d8c1f459bc54ca691cbf4
-
Filesize
13KB
MD53971132e399663c79cc1b805c570ea07
SHA19823a3cee46f23558da7a7e60a3d8ce49679083b
SHA256272f2c83dfd083525c4b8d60b7d614a35dab8d75351026f7916b222226d5d7c8
SHA51295b629113631154029c84a95ab78a3fd6978710d546a71bd66ca4fb4443e75fb25ba55abe23940c737777d788d06004a08e284342053edd2f55f2e735b0f6844
-
Filesize
107KB
MD5818e9f315cc504223d35be6beffa6924
SHA1ef03dc9eea969aaff4414df8d1c13860f2b05167
SHA2561a29079f87db28bbf04fde9ce88749ded368b3dbf4317d6ea11904201c44be34
SHA512687a025c8e98ee8cb8fbfb28b4da9f0bd60597d944b3dc4d0b9c5c3204858aa9f85472c70ae743f923ea5d2d3f2786831b40f130b5279d1a971bee93869df364
-
Filesize
652B
MD50fd59f5244c3a33db12f877d1b1b5b66
SHA10ead069fbdfa716771d0c40e9c04b2cac60b4448
SHA256cee259722da57378701adaf55c5fadf55fb655fb2cbcf0722ee5be0bd8a6b4b6
SHA51245d8bd7d35139c08041305686d3ce8caea501c41ff70d51bf4461a156720d8445b2906b6e71a1661ef22e2d21a4a5e8b3683a5c1edb57487107ed6f77b4bfe4e
-
Filesize
106KB
MD5a7c99d03e54108a5200845f6b328585f
SHA12fabc1d6ce1e3e161d8f7bb695848313bfb9e4df
SHA25634ef806599ced48cf0b72c6b6b9b7db6570b51c847f76b2f4a63102e83ae8506
SHA512135ef80f7b0979ba5b93e10acb26d01ce52bd9a7c7708306953c80309bcee921fe960d513fcc986853095fc69096947daa4a009f98a6d7f98311a4c1ea913bfa
-
Filesize
660B
MD53f1ad38d5df022abe376692dcdb7c441
SHA1f79502eebc6de935871e616c668ecef181371f5a
SHA2566fbbcc87b22ee66755fb76809af5f035972c97c9813f58d9b7db411bceb879a6
SHA512939b5106095a9e45072da84c5b4bdcb7dbf0784992616cf00ba625c56783ab856a33dc1e3397abb95c051cc063d230cdbaa53d24b14178a9bcd684f8c5566d62